Authentication And Access Control: Practical Cryptography Methods And Tools [1st Edition] 1484265696, 9781484265697, 9781484265703

Cybersecurity is a critical concern for individuals and for organizations of all types and sizes. Authentication and acc

352 119 212KB

English Pages 242 Year 2021

Report DMCA / Copyright

DOWNLOAD PDF FILE

Table of contents :
Table of Contents......Page 4
About the Author......Page 10
About the Technical Reviewer......Page 11
Acknowledgments......Page 12
Introduction......Page 13
What Is “Security”?......Page 16
The CIA Model......Page 17
Integrity......Page 18
Principles of Cryptography......Page 19
Symmetric Cryptography......Page 22
Stream Ciphers......Page 23
Block Ciphers......Page 24
AES......Page 25
Modes of Operation......Page 27
Asymmetric Cryptography......Page 29
RSA......Page 31
Hybrid Cryptosystem......Page 33
Cryptographic Hash Functions......Page 35
SHA-256......Page 38
CBC-MAC......Page 39
Digital Signatures......Page 40
RSA Digital Signature Generation and Verification......Page 43
Non-repudiation......Page 44
Bibliography......Page 45
Chapter 2: Public Key Infrastructure......Page 46
PKI’s Uses and Benefits......Page 47
PKI Framework......Page 48
Certificate Exchange......Page 51
Entity Authentication......Page 54
Digital Certificate Generation......Page 55
Digital Certificate Revocation......Page 56
Summary......Page 57
Bibliography......Page 58
What Is Authentication?......Page 59
Factors of Authentication......Page 62
Something You Know......Page 63
Something You Have......Page 64
Something You Are......Page 66
Something You Process......Page 68
Somewhere You Are......Page 70
Somebody You Know......Page 71
Threats of Authentication......Page 73
Eavesdropping......Page 74
Replay Attacks......Page 75
Password Guessing......Page 76
Credential Stuffing......Page 77
In-Person Social Engineering......Page 78
Phone Social Engineering......Page 79
Digital Social Engineering......Page 80
Bibliography......Page 83
Chapter 4: Password-Based Authentication......Page 85
Keys vs. Passwords......Page 86
Choosing a Password......Page 87
Quality of a Password......Page 88
Encrypted Passwords......Page 91
Hashed Passwords......Page 92
Salted Passwords......Page 94
Password Quality Adjustment......Page 95
Salt Placement......Page 96
How Does It All Work?......Page 98
A Working Example......Page 99
Is It Secure?......Page 101
Grid-Based Passwords......Page 102
Recognition-Based Systems......Page 103
Security Analysis......Page 106
Recall-Based Systems......Page 112
Android Pattern Lock......Page 115
Bibliography......Page 118
Chapter 5: Biometric Authentication......Page 120
What Is Biometrics?......Page 121
Categories of Biometrics......Page 122
Biometric Properties......Page 125
Biometric Authentication......Page 126
Fingerprint Authentication......Page 128
Iris Authentication......Page 129
Performance Metrics of Biometric Authentication......Page 130
Fundamental Performance Metrics......Page 131
Authentication Performance Metrics......Page 132
Biometric Threshold......Page 133
Equal Error Rate......Page 134
Finding a Biometric Threshold......Page 136
Finding Biometric Threshold: Iris Case Study......Page 137
Access Control and Clocking System......Page 140
Border Control......Page 141
Concerns and Future of Biometrics......Page 142
Bibliography......Page 144
Chapter 6: Multi-factor Authentication......Page 146
Issues with Traditional Authentication......Page 147
Two-Factor Authentication......Page 148
Common Authentication Factors......Page 149
Hardware Authentication Token......Page 150
Short Message Service (SMS)......Page 151
Software Authentication Token......Page 152
Biometrics......Page 154
Hand-Drawn Image......Page 156
Is Two-Factor Authentication More Secure?......Page 157
Healthcare......Page 159
Education......Page 160
Social Media......Page 161
Multi-factor Authentication......Page 162
Authentication Factor Generation......Page 164
Authentication......Page 165
Multi-factor Biometric-Based Authentication......Page 167
Authentication Factor Generation......Page 168
Authentication......Page 169
Multi-factor Authentication Evaluation......Page 170
Security Evaluation......Page 171
Usability Evaluation......Page 172
Summary......Page 173
Bibliography......Page 174
Chapter 7: Authentication and Key Establishment Protocols......Page 176
Authentication Protocols......Page 177
Andrew Secure RPC Protocol......Page 179
Needham–Schroeder Protocol......Page 181
Needham–Schroeder Public Key Protocol......Page 183
Secure Socket Layer (SSL)......Page 186
Kerberos......Page 191
Client Login......Page 193
Kerberos Ticket Exchange......Page 194
Designing Authentication Protocols......Page 197
Specific Principles......Page 199
Generic Principles......Page 200
Principle 2: Clear condition for protocol messages......Page 201
Principle 3: Identification of protocol principals......Page 202
Principle 4: Needs for encryption......Page 204
Principle 5: Inconclusiveness of message content knowledge......Page 205
Principle 6: Freshness of protocol messages......Page 206
Summary......Page 207
Bibliography......Page 208
The ID4D Initiative......Page 209
Identity Life Cycle......Page 210
Authentication Assurance Level 1 (AAL1)......Page 213
Authentication Assurance Level 2 (AAL2)......Page 214
Authentication Assurance Level 3 (AAL3)......Page 215
Continuous Authentication......Page 216
Conventional Approach......Page 217
Emerging Approaches......Page 218
Keystroke Dynamics......Page 221
Gaze Patterns......Page 222
Walking Patterns......Page 223
Other Interesting Methods......Page 224
Issues with Biometrics......Page 225
Characteristics of Biometric Authentication Systems......Page 226
Biometric Cryptosystems......Page 227
Biometric Salting......Page 228
Non-invertible Biometric Transformation......Page 230
Summary......Page 232
Bibliography......Page 233
Index......Page 235

Authentication And Access Control: Practical Cryptography Methods And Tools [1st Edition]
 1484265696, 9781484265697, 9781484265703

  • 0 0 0
  • Like this paper and download? You can publish your own PDF file online for free in a few minutes! Sign Up
File loading please wait...
Recommend Papers